This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: A Self-adaptive Intrusion Detection Method for AODV-based Mobile Ad Hoc Networks Satoshi Kurosawa † , Hidehisa Nakayama † , Nei Kato † , Abbas Jamalipour ‡ , and Yoshiaki Nemoto † † Graduate School of Information Sciences, Tohoku University Aoba 6–3–09, Aramaki, Aoba-ku, Sendai, Miyagi, 980–8579 Japan ‡ School of Electrical and Information Engineering, The University of Sydney, Sydney NSW 2006,Australia [email protected] Abstract Mobile ad hoc networks (MANET) are usually formed without any major infrastructure. As a result, they are relatively vulnerable to malicious network at- tacks and therefore the security is a more significant issue than in infrastructure-type wireless networks. In these networks, it is difficult to identify malicious hosts, as the topology of the network changes dynamically. A malicious host can easily interrupt a route for which the malicious host is one of the forming nodes in the communication path. In the literature, there are sev- eral proposals to detect such malicious host inside the network. In those methods usually a baseline profile is defined in accordance to static training data and then they are used to verify the identity and the topol- ogy of the network, thus avoiding any malicious host to be joined in the network. Since the topology of a MANET is dynamically changing, use of a static pro- file is not efficient. In this paper, we propose a new intrusion detection scheme based on a learning process, so that the training data can be updated at particular time intervals. The simulation results show the effec- tiveness of the proposed technique compared to conven- tional schemes. 1 INTRODUCTION Mobile ad hoc networks (MANET) recently have re- ceived particular attention as part of next generation network technologies. These networks are usually con- structed using mobile and wireless host with minimum or no central control or point of attachment such as a base station. These networks could be useful in a variety of applications from a one-off meeting network, to disaster and military applications, and to the enter- tainment industry. Because in a MANET the network topology is changing frequently and there is no central manage- ment unit, all routing management are performed by individual nodes in a collaborative way. Consequently, there would be no authentication server that can use conventional cryptographic schemes to secure the net- work against attacks from malicious host. Typical types of attacks in MANET include: eavesdropping, spoofing, forged packets, denial of service (DoS), and so on. Secure routing protocol , in which crypto- graphic technologies are applied have been suggested as a means for increasing the security in MANET. How- ever, these methods cannot protect the network from attacks of a harmful node who has acquired the net- work key. Therefore other security methods which can detect attacks from malicious hosts are required....
View Full Document
- Spring '12
- routing protocol, Routing Information Protocol, Distance-vector routing protocol, Ad Hoc Networks